Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection

Marianne Azer, Sherif El-Kassas, Magdi M. S. El-Soudani. Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. In Manu Malek, Eduardo Fernández-Medina, Javier Hernando, editors, SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. pages 63-68, INSTICC Press, 2006.

Abstract

Abstract is missing.